Security flaws in Windows XP due to Kernel Complexity Presented by: Zubin Lalani Daniel Beech Professor : Mike Burmester.

Slides:



Advertisements
Similar presentations
Chapter 8: Operating Systems and Utility Programs
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
P1-P2-M1-D1-D2.
Chapter 7 Operating Systems and Utility Programs.
Spyware and other annoying Pop-ups. What are we going to learn? What is spyware What is the threat Where does it come from Why does spyware exist How.
Computer Viruses.
Viruses and Spyware The Real Story Mr. G. From Whence Spyware Comes Spyware usually ends up on your machine because of something you do, like clicking.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
The MS Blaster worm Presented by: Zhi-Wen Ouyang.
Figure 1.1 Interaction between applications and the operating system.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
The Death of Windows XP End of the line for venerable operating system Dr. Jan Vanderpool
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
Protecting Your Computer & Your Information
MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 11 Case Study 2: Windows Vista Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall,
Unit 2 - Hardware Computer Security.
Tutorial 11 Installing, Updating, and Configuring Software
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Midori Life after windows Microsoft Research’s. Singularity  Midori is a stem off of this operating system  A research project started in 2003 to build.
Kernel, processes and threads Windows and Linux. Windows Architecture Operating system design Modified microkernel Layered Components HAL Interacts with.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
DIT314 ~ Client Operating System & Administration CHAPTER 2 INTRODUCTION TO WINDOWS XP PROFESSIONAL Prepared By : Suraya Alias.
Detection and Prevention of Buffer Overflow Exploit Cai Jun Anti-Virus Section Manager R&D Department Beijing Rising Tech. Corp. LTD.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
C HAPTER 2 Introduction to Windows XP Professional.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Can We Make Operating Systems Reliable and Secure? Andrew S. Tanenbaum, Jorrit N. Herder, and Herbert Bos Vrije Universiteit, Amsterdam May 2006 Group.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
CS 346 – Chapter 2 OS services –OS user interface –System calls –System programs How to make an OS –Implementation –Structure –Virtual machines Commitment.
Security Architecture and Design Chapter 4 Part 1 Pages 297 to 319.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Computer Software Operating Systems – Programs. Computer Language - Review We learnt that computers are made up of millions of tiny switches that can.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Computer virus Done: Aaesha Mohammed ID: H
CCNA1 v3 Module 1 v3 CCNA 1 Module 1 JEOPARDY K. Martin.
Overview of Windows Driver Development Reference: us/gstart/hh/gstart/gs_intro_031j.asp.
System Programming Basics Cha#2 H.M.Bilal. Operating Systems An operating system is the software on a computer that manages the way different programs.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Chapter 4. CONCEPT OF THE OPERATING SYSTEM MANAGING ESSENTIAL FILE OPERATIONS.
OVERVIEW Virus & Worm overview Virus & Worm Difference CodeRed Worm Impact Detection Prevention.
Information Technology. *At Home *In business *In Education *In Healthcare Computer Uses.
Latest Issues Related To The AVG Antivirus 2017
Computer System Structures
Discovering Computers 2012: Chapter 8
MALWARE Autumn Mattis.
LINUX WINDOWS Vs..
Cyber Security By: Pratik Gandhi.
Firewalls.
LINUX WINDOWS Vs..
What is an Operating System?
Computer Technology Notes 5
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Viruses and Virus Protection
Malware CJ
Functions of an operating system
B.Ramamurthy Chapter 2 : Appendix
Presentation transcript:

Security flaws in Windows XP due to Kernel Complexity Presented by: Zubin Lalani Daniel Beech Professor : Mike Burmester

Presentation Outline Windows Vs Linux Kernel Organization Windows Security Model Security Flaws in Windows Microsoft Future plans for security

Windows Kernel Organization Originally designed as stand alone “offline” system Over System calls Supports over 4000 distinct system configuration Over 50 million lines of code 600 million Windows copies (figures of July 2004) Windows 2000 supports more than 7,000 devices

Less than 255 system calls for linux Linux 2.6 has not more than 4 million phyiscal line of code Approximate 18 million users Lack of distinct hardware support Linux Kernel Organization

Kernel Organization Kernel-mode organized into NTOS (kernel-mode services) –Run-time Library, Scheduling, Executive services, object manager, services for I/O, memory, processes, … Hal (hardware-adaptation layer) –Insulates NTOS & drivers from hardware dependencies –Providers facilities, such as device access, timers, interrupt servicing, clocks, spinlocks

LINUX ARCHITECTURE

Windows Security Model … Security Model based on securable objects Based on per-object rights – “Generic read, write and execute” Model Involves following concepts : Security Identifiers Access Tokens Security Descriptors Access Control Lists and Privileges

WINDOWS SECURITY MODEL

FAMOUS FLAWS … Mellissa Virus Forced Microsoft to completely turn off their system Started to affect in March 1999 More than $80 million I Love You Virus Affected May 2000 Brought down deleted.mp3 and.jpg files and mails to every contact in microsoft Outlookwww.skyinet.net $1 Billion financial loss in North America alone and more than $2.5 in total Affected more than computer

FAMOUS FLAWS Code Red The economic cost more than $2 billion Was so powerful that it forced White House to change its numerical IP address and prompted the Pentagon to takes its website offline Blaster Worm $500 million or more estimate in Financial loss 16 million or more system fell victim Exploited the DCOM(Distributed component object Model) vulnerability Happened in August 2003

LATEST SECURITY THREATS SPYWARE Not a virus but a complete program Tracks internet habits and nags you with advertisment About 2/3 rd personal computers are infected How it works? - Piggybacked software installation, Drive-by download, Browser add-ons, Masquerading as anti-spy ware

FUTURE PLANS Include Windows Anti Spy-ware Technology Improvements in Windows Update Site “Singularity” prototype OS - said to be Very Secure

Biblography